必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
164.132.12.49 attackspam
SSH login attempts.
2020-03-19 13:02:52
164.132.12.43 attackbotsspam
Unauthorized connection attempt detected from IP address 164.132.12.43 to port 8080 [J]
2020-03-02 19:02:49
164.132.122.241 attackbotsspam
Honeypot attack, port: 445, PTR: ip241.ip-164-132-122.eu.
2020-02-08 00:48:41
164.132.122.241 attack
Honeypot attack, port: 445, PTR: ip241.ip-164-132-122.eu.
2020-02-06 17:49:30
164.132.122.255 attackbotsspam
Unauthorized connection attempt detected from IP address 164.132.122.255 to port 1433 [J]
2020-02-04 00:10:19
164.132.12.22 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-12-02 22:31:06
164.132.12.22 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-29 04:28:52
164.132.122.244 attackspam
WordPress wp-login brute force :: 164.132.122.244 0.104 BYPASS [27/Jul/2019:01:54:25  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-27 02:50:46
164.132.122.244 attackbots
WordPress wp-login brute force :: 164.132.122.244 0.156 BYPASS [26/Jul/2019:10:43:04  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-26 11:22:02
164.132.122.244 attackbots
Request: "GET /wp-login.php HTTP/1.1"
2019-07-26 03:53:55
164.132.122.244 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-07-08 16:49:13
164.132.122.244 attackbots
WordPress wp-login brute force :: 164.132.122.244 0.060 BYPASS [04/Jul/2019:23:14:25  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-04 23:23:13
164.132.122.244 attack
wp-login.php
2019-07-04 18:24:30
164.132.122.244 attackbots
web exploits
...
2019-07-04 00:09:52
164.132.122.244 attack
404 NOT FOUND
2019-06-27 18:52:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.132.12.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.132.12.213.			IN	A

;; AUTHORITY SECTION:
.			363	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 20:31:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
213.12.132.164.in-addr.arpa domain name pointer ip213.ip-164-132-12.eu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.12.132.164.in-addr.arpa	name = ip213.ip-164-132-12.eu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.24.190.33 attackspambots
Unauthorized connection attempt from IP address 123.24.190.33 on Port 445(SMB)
2019-10-16 12:43:42
190.144.14.170 attackspambots
2019-10-16T04:02:09.834053abusebot-3.cloudsearch.cf sshd\[28575\]: Invalid user mc from 190.144.14.170 port 53094
2019-10-16 12:44:32
200.108.143.6 attackbotsspam
Oct 16 05:22:53 icinga sshd[25110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6 
Oct 16 05:22:54 icinga sshd[25110]: Failed password for invalid user super from 200.108.143.6 port 54948 ssh2
Oct 16 05:30:50 icinga sshd[30473]: Failed password for root from 200.108.143.6 port 55120 ssh2
...
2019-10-16 12:57:52
186.3.234.169 attackbots
Oct 16 04:36:36 localhost sshd\[13596\]: Invalid user alysha from 186.3.234.169 port 45188
Oct 16 04:36:36 localhost sshd\[13596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.3.234.169
Oct 16 04:36:37 localhost sshd\[13596\]: Failed password for invalid user alysha from 186.3.234.169 port 45188 ssh2
Oct 16 04:42:24 localhost sshd\[13815\]: Invalid user test from 186.3.234.169 port 37205
Oct 16 04:42:24 localhost sshd\[13815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.3.234.169
...
2019-10-16 12:42:55
192.115.165.3 attack
ET DROP Dshield Block Listed Source group 1 - port: 1094 proto: TCP cat: Misc Attack
2019-10-16 12:56:09
122.96.40.124 attackbots
Unauthorized connection attempt from IP address 122.96.40.124 on Port 445(SMB)
2019-10-16 13:02:58
122.3.39.184 attack
Unauthorized connection attempt from IP address 122.3.39.184 on Port 445(SMB)
2019-10-16 12:29:13
138.118.87.7 attack
Unauthorized connection attempt from IP address 138.118.87.7 on Port 445(SMB)
2019-10-16 12:38:49
68.183.86.76 attackbotsspam
SSH invalid-user multiple login try
2019-10-16 12:30:57
87.103.170.178 attackbotsspam
Unauthorized connection attempt from IP address 87.103.170.178 on Port 445(SMB)
2019-10-16 13:05:32
122.11.56.170 attackbots
10/16/2019-05:30:40.361339 122.11.56.170 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-16 13:06:45
163.172.13.168 attackbots
Jul 31 10:12:48 vtv3 sshd\[21946\]: Invalid user andrei from 163.172.13.168 port 36588
Jul 31 10:12:48 vtv3 sshd\[21946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168
Jul 31 10:12:50 vtv3 sshd\[21946\]: Failed password for invalid user andrei from 163.172.13.168 port 36588 ssh2
Jul 31 10:16:46 vtv3 sshd\[23944\]: Invalid user sit from 163.172.13.168 port 45972
Jul 31 10:16:46 vtv3 sshd\[23944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168
Jul 31 10:30:37 vtv3 sshd\[31034\]: Invalid user undernet from 163.172.13.168 port 51854
Jul 31 10:30:37 vtv3 sshd\[31034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168
Jul 31 10:30:39 vtv3 sshd\[31034\]: Failed password for invalid user undernet from 163.172.13.168 port 51854 ssh2
Jul 31 10:34:41 vtv3 sshd\[388\]: Invalid user liz from 163.172.13.168 port 33096
Jul 31 10:34:41 vtv3 sshd\[388
2019-10-16 13:03:47
5.196.11.146 attack
5.196.11.146 - - [16/Oct/2019:05:31:13 +0200] "POST /wp-login.php HTTP/1.1" 200 2112 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.196.11.146 - - [16/Oct/2019:05:31:14 +0200] "POST /wp-login.php HTTP/1.1" 200 2093 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-16 12:35:40
14.174.101.209 attackbots
Unauthorized connection attempt from IP address 14.174.101.209 on Port 445(SMB)
2019-10-16 13:00:52
222.186.175.216 attackspambots
Oct 16 01:56:41 firewall sshd[2464]: Failed password for root from 222.186.175.216 port 17084 ssh2
Oct 16 01:56:41 firewall sshd[2464]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 17084 ssh2 [preauth]
Oct 16 01:56:41 firewall sshd[2464]: Disconnecting: Too many authentication failures [preauth]
...
2019-10-16 12:57:14

最近上报的IP列表

164.132.134.203 164.132.122.212 164.132.128.226 164.132.127.192
149.102.248.151 164.132.168.204 164.132.166.29 164.132.170.227
164.132.164.220 164.132.168.182 164.132.170.19 164.132.168.171
164.132.171.194 164.132.168.147 164.132.169.172 164.132.169.16
164.132.169.215 164.132.181.210 164.132.172.233 164.132.186.165